In addition to targeted attacks that aim at a specific target, recently there are more attacks that try to find vulnerabilities through which corporate ICT systems can be infiltrated. Information and communications technologies are constantly evolving, making it difficult to totally defend and protect entire ICT systems; in fact it is not reasonable to even attempt this. To repel these attacks, companies and organizations that are on the defending side must understand the vulnerabilities in their own systems. By using the power of information to understand the "big picture" of your own ICT environment, you can take the appropriate action to prevent a specific problem from developing, or to minimize the damage should an infiltration occur.
"Know your own vulnerabilities and take swift countermeasures." This kind of proactive cyber security will become increasingly vital in the future. I am currently involved in the planning and marketing of safe, advanced products that help implement proactive security against increasingly stealthy cyber attacks. As an example, the best way to handle a fire is not by wasting time looking for the source or running down the road searching for a fire extinguisher: it is knowing beforehand the places where fires are most likely to occur and having fire extinguishers located near at hand. Proactive cyber security is based on this concept.